Products
-
The Supply Chain Paradox: When “Hardened” Images Become a Vendor Lock-in Trap
Explore the paradox of hardened container images—strong security gains but hidden vendor lock-in risks. Learn how to harden without losing control.
Read now
-
Docker @ Black Hat 2025: CVEs have everyone’s attention, here’s the path forward
At Black Hat 2025, CVEs dominated the conversation. See how Docker Hardened Images, proven security patterns, and AI-ready foundations help teams eliminate security debt, enforce compliance, and build trust from code to production.
Read now
-
A practitioner’s view on how Docker enables security by default and makes developers work better
Learn how Docker streamlines container security without slowing developers. Build compliant, secure apps with a great developer experience.
Read now
-
Docker Desktop 4.44: Smarter AI Modeling, Platform Stability, and Streamlined Kubernetes Workflows
In Docker Desktop 4.44, we’re delivering enhanced reliability, tighter AI modeling controls, and simplified tool integrations so you can build with confidence.
Read now
-
MCP Horror Stories: The GitHub Prompt Injection Data Heist
Attackers can exploit GitHub issues to hijack AI assistants and exfiltrate private data. Discover how Docker’s OAuth safeguards against cross-repository data theft.
Read now
-
Building AI agents made easy with Goose and Docker
Learn how you can build an AI agent easily with Goose and Docker Model Runner.
Read now
-
Build a Recipe AI Agent with Koog and Docker
Explore how to create a small Koog agent specializing in ratatouille recipes using popular Docker AI tools.
Read now
-
MCP Horror Stories: The Supply Chain Attack
Learn about a critical OAuth vulnerability in mcp-remote that led to credential compromise and remote code execution across AI development environments.
Read now